- Joined
- Oct 23, 2012
- Messages
- 442
- Motherboard
- Dell XPS 13 9360 (Clover)
- CPU
- i7-7500U
- Graphics
- HD 620, 1920x1080
Thank you very much Bozma88.
When i saw this guide posted not so long ago i could not believe it, it is so well made, very detailed.
Thanks to Rehabman too for his various contributions to this guide and to all matters related to Mac OS.
For now, i have only one question:
Introduction:
I live in a place where there are too many cases of violence, is common to hear about armed robbery, so when i heard my XPS 13 had a BIOS persistent module (called Computrace, by Absolute Software) to aid in recovery in case of theft, and that the service subscription was not so expensive, i planned to buy it without thinking twice, but there are Pro's and Con's.
Pro's: 1 - Inexpensive (compared to Insurance)
2 - Persistent (Can survive HD replacement)
Con's: 1 - I don't know if it can be used (activated) with Mac OS. (that's the main reason for my question here.)
2 - There are security specialist articles from Kaspersky and a live demonstration (i don't know if i can post the youtube link here, will edit later) that can prove that the module can be exploited by Malware to make it like a super trojan horse, undetectable and persistent.
3 - Some people say that this safety mechanism can be easily bypassed by ill intentioned people, making this solution, expensive, inefective and prone to malware infection.
Sorry, i don't want to hijack this thread, if necessary i can relocate (or ask moderator to relocate) this post to another forum, but i found it relevant it can be pertinent to various XPS 13 9360 Owners that want to install Mac OS.
Note: I know that Computrace cannot be used if Mac OS is the Only OS installed, but i plan to use Dual boot, and even if not, there is high chance that the thief would try to install Windows anyway. making the BIOS module usable again.
Computrace is something that caught my attention too.
Cons n.2 is the main reason I abandoned further research on the topic (I have a degree in IT and network security, so I tend to imagine the worst case scenario, it's what we've been taught to do).
A similar vulnerability in low level network firmware has just been patched after many years: http://thehackernews.com/2017/05/intel-amt-vulnerability.html
Last thing you want is your pc permanently locked and held at ransom.
My advice:
Configure iCloud and Find My Mac, enable guest user, password lock the BIOS, disable USB boot.
This way, there's no easy way to format, other than swapping the NVME SSD, so a "new owner" may be inclined to boot in Guest mode and connect to the internet.
You can also leave a message on the OS login screen, and I wrote my personal contacts ("if found, contact ...").